no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
BERR: More work to do on security
|
|
|
2008 |
2008 |
5 |
p. 2- 1 p. |
article |
2 |
Collective intelligence approaches to malware recognition
|
Urzay, Iñaki |
|
2008 |
2008 |
5 |
p. 14-16 3 p. |
article |
3 |
Developing world, developing problems
|
Sunner, Mark |
|
2008 |
2008 |
5 |
p. 4-7 4 p. |
article |
4 |
Events calendar
|
|
|
2008 |
2008 |
5 |
p. 20- 1 p. |
article |
5 |
In brief
|
|
|
2008 |
2008 |
5 |
p. 3- 1 p. |
article |
6 |
Managing both careers and risks
|
Colley, John |
|
2008 |
2008 |
5 |
p. 7-9 3 p. |
article |
7 |
Mozilla serves up infected files
|
|
|
2008 |
2008 |
5 |
p. 20- 1 p. |
article |
8 |
Researchers crack bot net secrets
|
|
|
2008 |
2008 |
5 |
p. 2- 1 p. |
article |
9 |
Security for safety in railways
|
Forte, Dario V |
|
2008 |
2008 |
5 |
p. 17-19 3 p. |
article |
10 |
SQL attackers strike again
|
|
|
2008 |
2008 |
5 |
p. 1- 1 p. |
article |
11 |
Symantec: Spammers using AdWords
|
|
|
2008 |
2008 |
5 |
p. 20- 1 p. |
article |
12 |
Treating employees as a threat
|
Roemer, Kurt |
|
2008 |
2008 |
5 |
p. 9-11 3 p. |
article |
13 |
Vulnerability management at the crossroads
|
Arce, Iván |
|
2008 |
2008 |
5 |
p. 11-13 3 p. |
article |